Resubmissions
25-06-2021 19:00
210625-l7qmjgnpce 1019-01-2021 19:24
210119-ghpg62s8zx 1018-01-2021 18:42
210118-qjpbmwpaks 10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 19:24
Static task
static1
Behavioral task
behavioral1
Sample
Lists.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Lists.exe
Resource
win10v20201028
General
-
Target
Lists.exe
-
Size
799KB
-
MD5
c715a5419ed1ece6e2051e35d3674cc3
-
SHA1
98e8a74c315b42b88e73129108d5ad338c888124
-
SHA256
c363769d3d6ae833d71203a5a678ad04349404eae3788865fcdb706c3c7543b0
-
SHA512
1cbec375fff5500f8247c4be30b6aa15de47ab73b7d914036c76b05ca9db6eb89aad21f1d45fe955c068a8df94393d34a1b88c2fc159340b72759c0dfa93983d
Malware Config
Extracted
remcos
185.140.53.136:1818
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Lists.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Lists.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" Lists.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
Lists.execmd.exeLists.exeLists.exeLists.exeWScript.exedescription pid process target process PID 1432 wrote to memory of 1208 1432 Lists.exe cmd.exe PID 1432 wrote to memory of 1208 1432 Lists.exe cmd.exe PID 1432 wrote to memory of 1208 1432 Lists.exe cmd.exe PID 1432 wrote to memory of 1208 1432 Lists.exe cmd.exe PID 1432 wrote to memory of 1456 1432 Lists.exe Lists.exe PID 1432 wrote to memory of 1456 1432 Lists.exe Lists.exe PID 1432 wrote to memory of 1456 1432 Lists.exe Lists.exe PID 1432 wrote to memory of 1456 1432 Lists.exe Lists.exe PID 1208 wrote to memory of 1992 1208 cmd.exe schtasks.exe PID 1208 wrote to memory of 1992 1208 cmd.exe schtasks.exe PID 1208 wrote to memory of 1992 1208 cmd.exe schtasks.exe PID 1208 wrote to memory of 1992 1208 cmd.exe schtasks.exe PID 1456 wrote to memory of 1904 1456 Lists.exe Lists.exe PID 1456 wrote to memory of 1904 1456 Lists.exe Lists.exe PID 1456 wrote to memory of 1904 1456 Lists.exe Lists.exe PID 1456 wrote to memory of 1904 1456 Lists.exe Lists.exe PID 1904 wrote to memory of 1784 1904 Lists.exe Lists.exe PID 1904 wrote to memory of 1784 1904 Lists.exe Lists.exe PID 1904 wrote to memory of 1784 1904 Lists.exe Lists.exe PID 1904 wrote to memory of 1784 1904 Lists.exe Lists.exe PID 1784 wrote to memory of 1092 1784 Lists.exe WScript.exe PID 1784 wrote to memory of 1092 1784 Lists.exe WScript.exe PID 1784 wrote to memory of 1092 1784 Lists.exe WScript.exe PID 1784 wrote to memory of 1092 1784 Lists.exe WScript.exe PID 1092 wrote to memory of 1476 1092 WScript.exe cmd.exe PID 1092 wrote to memory of 1476 1092 WScript.exe cmd.exe PID 1092 wrote to memory of 1476 1092 WScript.exe cmd.exe PID 1092 wrote to memory of 1476 1092 WScript.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lists.exe"C:\Users\Admin\AppData\Local\Temp\Lists.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN systemfiles64 /XML "C:\Users\Admin\AppData\Local\Temp\1ade0704ac3e4fb2ba15d56f097cccb0.xml"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN systemfiles64 /XML "C:\Users\Admin\AppData\Local\Temp\1ade0704ac3e4fb2ba15d56f097cccb0.xml"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Lists.exe"C:\Users\Admin\AppData\Local\Temp\Lists.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lists.exe"C:\Users\Admin\AppData\Local\Temp\Lists.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lists.exe"C:\Users\Admin\AppData\Local\Temp\Lists.exe"4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1ade0704ac3e4fb2ba15d56f097cccb0.xmlMD5
88680b78e11695a91d52603085d85164
SHA1c188839c25b275be52a25c30a1b5fe6395afdbea
SHA2561f8daa6e49ee1c9b18c532f488043618dd27e350a62936da18fc98cdaaa8fbc5
SHA512ec53a14c06196bf2cbdf09996816b9af5d2789ea94bb20434206720209a4c38786a10286e07229c4ece2c81683736d6e556511ab2941ac7d50cb0b84769dd7a0
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
b92d64fe5b1d1f59df4b738262aea8df
SHA1c8fb1981759c2d9bb2ec91b705985fba5fc7af63
SHA256fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a
SHA5122566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2
-
memory/1092-12-0x0000000000000000-mapping.dmp
-
memory/1092-17-0x0000000002550000-0x0000000002554000-memory.dmpFilesize
16KB
-
memory/1208-3-0x0000000000000000-mapping.dmp
-
memory/1432-2-0x0000000075BF1000-0x0000000075BF3000-memory.dmpFilesize
8KB
-
memory/1456-4-0x0000000000000000-mapping.dmp
-
memory/1476-16-0x0000000000000000-mapping.dmp
-
memory/1784-10-0x0000000000000000-mapping.dmp
-
memory/1784-15-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1904-8-0x0000000000000000-mapping.dmp
-
memory/1992-6-0x0000000000000000-mapping.dmp